You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-private-hostname.mdx
+50-18Lines changed: 50 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,10 +110,10 @@ In your WARP [device profiles](/cloudflare-one/connections/connect-devices/warp/
- Private network CIDR where the application is located (for example, `10.0.0.0/8`)
113
+
- Private network CIDR where the application is located
114
114
- Internal DNS resolver IP
115
115
116
-
For more details on configuring Split Tunnels, refer to [Route private network IPs through WARP](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp).
116
+
For example, if you are using the default Split Tunnels Exclude configuration and your application and DNS resolver have private IPs in the range `10.0.0.0/8`, delete `100.64.0.0/10` and `10.0.0.0/8` from the Split Tunnels list. We recommend adding back the IPs that are not explicitly used by your network — refer to our [Split Tunnels calculator](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) for details.
117
117
118
118
#### Local Domain Fallback
119
119
@@ -180,27 +180,59 @@ Access policies and Gateway network policies only support hostname-based filteri
180
180
181
181
### 7. Test the connection
182
182
183
-
End users can now reach the application by going to its private hostname. For example, to test an HTTP application, open a terminal on a WARP device and run
184
-
```sh
185
-
curl -v4 http://wiki.internal.local
186
-
```
187
-
```sh output
188
-
* Trying 100.80.77.135:80...
189
-
* Connected to wiki.internal.local (100.80.77.135) port 80
190
-
...
191
-
```
183
+
WARP users can now reach the application by going to its private hostname. For example, to connect to a private web application, open a browser and go to `wiki.internal.local`.
192
184
193
-
The output should show a successful connection to an <GlossaryTooltipterm="initial resolved IP">initial resolved IP</GlossaryTooltip>.
185
+
#### Troubleshooting
194
186
195
-
If you [enabled the Gateway proxy](#enable-the-gateway-proxy), you can view the traffic in your [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/). You can also check your [tunnel logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing to the application.
187
+
You can run the following tests to check if private hostname routing is properly configured.
196
188
197
-
### Troubleshooting
189
+
1. From the WARP device, confirm that you can successfully resolve the private hostname using your internal DNS server:
198
190
199
-
:::note[Common misconfigurations]
200
-
Routing issues are the most common type of misconfiguration. Make sure to check WARP Split Tunnels and Local Domain Fallback as described in [Step 5](#5-route-traffic-through-warp).
201
-
:::
191
+
```sh
192
+
nslookup wiki.internal.local 10.0.0.1
193
+
```
194
+
195
+
```sh output
196
+
Server: 10.0.0.1
197
+
Address: 10.0.0.1#53
198
+
199
+
Name: wiki.internal.local
200
+
Address: 10.0.0.5
201
+
```
202
+
203
+
If the DNS lookup fails, it means that WARP cannot connect to your internal DNS server through `cloudflared`. Check that you have a [tunnel route](#2-connect-the-dns-server-to-cloudflare) for the internal DNS server IP. Also, confirm that the DNS server IP [routes through the WARP tunnel](#split-tunnels).
204
+
205
+
206
+
2. Run a standard `nslookup` for the private hostname:
207
+
208
+
```sh
209
+
nslookup wiki.internal.local
210
+
```
211
+
212
+
```sh output
213
+
Server: 127.0.2.2
214
+
Address: 127.0.2.2#53
215
+
216
+
Non-authoritative answer:
217
+
Name: wiki.internal.local
218
+
Address: 100.80.200.48
219
+
```
220
+
221
+
The query should resolve using [WARP's DNS proxy](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#dns-traffic) and return a Gateway <GlossaryTooltipterm="initial resolved IP">initial resolved IP</GlossaryTooltip>. If the query fails to resolve or returns a different IP, check your [Local Domain Fallback configuration](#local-domain-fallback) and [Gateway resolver policies](#3-optional-create-a-resolver-policy).
222
+
223
+
3. When you connect to the application using its private hostname, the device should make a connection to the <GlossaryTooltipterm="initial resolved IP">initial resolved IP</GlossaryTooltip>:
224
+
```sh
225
+
curl -v4 http://wiki.internal.local
226
+
```
227
+
```sh output
228
+
* Trying 100.80.200.48:80...
229
+
* Connected to wiki.internal.local (100.80.200.48) port 80
230
+
...
231
+
```
232
+
233
+
You can check your [tunnel logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing to the application's private IP.
202
234
203
-
For a step-by-step troubleshooting procedure, refer to [Troubleshoot private network connectivity](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/private-networks/).
235
+
For a generic WARP-to-Tunnel troubleshooting procedure, refer to [Troubleshoot private network connectivity](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/private-networks/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/gateway/egress-policies/egress-cloudflared.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,4 +101,4 @@ Gateway does not currently support hostname-based filtering for traffic on non-4
101
101
102
102
From a WARP device, open a browser and go to `app.bank.com`.
103
103
104
-
The traffic will appear in your [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/); Gateway DNS logs will show that `app.bank.com` resolved to an <GlossaryTooltipterm="initial resolved IP">initial resolved IP</GlossaryTooltip>, and network logs will show requests destined to that initial resolved IP. You can also check [`cloudflared`logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing to the tunnel.
104
+
You can search for `app.bank.com`in your [Gateway DNS logs](/cloudflare-one/insights/logs/gateway-logs/); the **DNS response details** section should show the public resolved IPs as well as an <GlossaryTooltipterm="initial resolved IP">initial resolved IP</GlossaryTooltip>. You can also check your [Cloudflare Tunnel logs](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/) to confirm that requests are routing through the tunnel to the public resolved IPs.
0 commit comments